Behavioral task
behavioral1
Sample
ad20a5da9acba492406b1117268a7951.apk
Resource
win7-20240704-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
ad20a5da9acba492406b1117268a7951.apk
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
ad20a5da9acba492406b1117268a7951.apk
-
Size
91KB
-
MD5
ad20a5da9acba492406b1117268a7951
-
SHA1
6f4a1ac63e2383a80167899076bc416336a5f908
-
SHA256
89c5e17054a661b5cd4562dc7e6e7a1529e6fd91067af6b299bdcef608365b57
-
SHA512
33451c723ac9271ab31b76ca77e32f4f4f4432889b7176f04de96cda65140d988c944248a5f379e54ea44d9aca44ad9d394735c4a3da2834e422071b96fa06bc
-
SSDEEP
1536:NJc5C7U9KCP6pBQGsHHSXfSLHbxCRwnGpS:NJc51syUQdHyXAbxCanQS
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ad20a5da9acba492406b1117268a7951.apk.apk .doc windows office2003